Resources

Blog

Where’s the Tipping Point? 6 Signs It’s Time for an MSSP

Explore six signs it’s time for your business to partner with a Managed Security Service Provider (MSSP). From rising security incidents to compliance demands and cost savings, learn how Fortra’s Alert Logic can strengthen your defenses with expert threat intelligence and 24/7 protection.
Live Webinar
Join GoAnywhere’s leadership team for a packed hour covering:Preview of GoAnywhere 2025 releasesWhat’s new in GoAnywhere from the second half of this yearA look at Fortra Threat Brain (a multi-vector hub of verified threat intelligence)Answers to your most common GoAnywhere questions ...
Live Webinar
The popularity of cloud-based file sharing services such as AWS, Dropbox, and OneDrive is undeniable. However, these user-friendly solutions come with some critical security drawbacks.Join Scott Messick, Lead Solutions Engineer, Fortra Dec. 12, as he discusses the pros and cons of cloud file sharing and introduce the advantages secure, managed file transfer (MFT) offers for...
Live Event
Come see Fortra at booth #33 at NAViGATE Toronto 2024 from November fourth to the sixth.
Live Event
Join us as we proudly sponsor the VMUG UserCon on November 13th! Swing by for a chat about MFT and see how we can help with your IT problems. Haven’t secured your spot yet? It’s free! ...
Live Event
Join us as we proudly sponsor the VMUG UserCon on October 24th! Swing by for a chat about MFT and see how we can help with your IT problems. Haven’t secured your spot yet? It’s free! ...
Blog

3 Ways Malware Can Reach Your IFS

It's true that IBM i can't be infected by a PC virus. It's also true that the IFS can act as a host and spread malicious programs throughout your environment.
Blog

Malware, Ransomware, and Viruses vs Your IBM i Server

Many of us have heard that you can’t get a virus on this platform, but the reality is that the integrated file system (IFS) is a tree-like structure. This structure can house Word documents, PDFs, MP3s, JPEG images, and these files can be just as infected on the IBM i server as they can on any Windows work station or server.
On-Demand Webinar

Making the Most of the Audit Journal

Watch IBM i pros Steve Sisk and Amy Williams to discover how to securely deploy ACS, how to use IBM i as a Certificate Authority (CA), how to configure ACS to use TLS, and other ACS security best practices.
Blog

Major Launches Announced on Release Day 2024.2

About Fortra’s Release Day Each quarter, we at Fortra get to roll out the fruits of our labors for the past few months. We showcase new features, updates, and even products. This Release Day features several groundbreaking projects. We’ve broken into the XDR arena and are thrilled to introduce you to our new offering. We’ve issued major releases for over a half-dozen of our flagship products....
On-Demand Webinar

How Fortra Enables Your Zero Trust Strategy

The concept of using a Zero Trust architecture in cybersecurity has been around for more than a decade, and its fundamental principle of “never trust, always verify” sounds straightforward enough. However, there’s a lot of noise around Zero Trust, often generated by vendors promising that their solution is that magic silver bullet to all of your Zero Trust problems. This can muddy the waters and...